Overview
Syllabus
Intro
The Thought Process
The Attacks Evolve
Targets Have Shifted
Motivation
DDOS
Breaches
Perimeter
Hacks Happen
Browser Exploit
Nakatomi Space
Black Hat 2003
Exploits
Bug bounties
The problem with bug bounties
Dont play this game
How users behave
Advanced technology
User safety
User choice
Reactive approach
Compliance
The Golden Truth
Infosec Defense
Machine Learning
Stop 99 of malware
One percent of malware
We have to change
Intelligence
Proactive Security Testing
Collect everything
Our customers
Historical data
Moores law
The value of historical data
Battle of Two Narratives
Red Team
Who are you scared of
User ratings
User hardening efforts
Metrics
Shift the curve
Booby traps
Analysis decides actions
Block diagrams
Tracking
Blueprint
Buying from the top
Compliance and audits
Creativity
Business Value
Taught by
Cooper